|Número de publicación||US6442754 B1|
|Tipo de publicación||Concesión|
|Número de solicitud||US 09/280,370|
|Fecha de publicación||27 Ago 2002|
|Fecha de presentación||29 Mar 1999|
|Fecha de prioridad||29 Mar 1999|
|Número de publicación||09280370, 280370, US 6442754 B1, US 6442754B1, US-B1-6442754, US6442754 B1, US6442754B1|
|Inventores||Bryce Allen Curtis|
|Cesionario original||International Business Machines Corporation|
|Exportar cita||BiBTeX, EndNote, RefMan|
|Citas de patentes (8), Otras citas (1), Citada por (207), Clasificaciones (12), Eventos legales (6)|
|Enlaces externos: USPTO, Cesión de USPTO, Espacenet|
This application is related to the following co-pending and commonly-assigned patent applications, which applications were filed on the same date herewith, and which applications are incorporated herein by reference in their entirety:
“A Cross-Platform Program, System, and Method Having a Global Registry Object for Mapping Registry Equivalent Functions in an AIX Operating System Environment,” having U.S. patent application Ser. No. 09/280,345;
“A Cross-Platform Program, System, and Method Having a Global Registry Object for Mapping Registry Equivalent Functions in an OS/2 Operating System Environment,” having U.S. patent application Ser. No. 09/280,350; “A Cross-Platform Program, System, and Method Having a Global Registry Object for Mapping Registry Functions in a Windows Operating System Environment,” having U.S. patent application Ser. No. 09/280,349;
“Global Registry Object for Mapping Registry Functions and Registry Equivalent Functions Across Multiple Operating Systems in a Cross-platform Program,” having U.S. patent application Ser. No. 09/280,371;
“A Cross-platform Program, System, and Method Having a System Independent Registry for Use on Operating Systems Irrespective of a Registry Equivalent,” having U.S. patent application Ser. No. 09/280,368;
“A System, Method, and Program for Enabling a Use of Property Object Having a Variable for a Property Value in a Cross-Platform Program,” having U.S. patent application Ser. No. 09/280,344;
“A System, Method, and Program for Overriding Program Properties,” having U.S. patent application Ser. No. 09/280,346;
“A System, Method and Program for Providing an Object-Oriented Install Architecture,” having U.S. patent application Ser. No. 09/280,352;
“A System, Method, and Program for Automatic Error Detection While Utilizing a Software State Machine for Carrying out the Process Flow of a Software Program,” having U.S. patent application Ser. No. 09/280,375;
“A System, Method, and Program for Utilizing a Software State Machine for Carrying Out the Process Flow of a Software Program,” having U.S. patent application Ser. No. 09/280,376;
“A System, Method, and Program for Enabling a Software Program to Automatically Select a System-dependent Function,” having U.S. patent application Ser. No. 09/280,369;
“A System, Method, and Program for Mapping a Global Object to Desktop Elements of Different Operating Systems,” having U.S. patent application Ser. No. 09/280,374;
“A System, Method, and Program for Modifying a Text File,” having U.S. patent application Ser. No. 09/280,348;
“A System, Method, and Program for Updating Registry Objects With a Cross-platform Installation Program,” having U.S. patent application Ser. No. 09/280,351;
“A System, Method, and Program For Preserving Background Settings During Install and Uninstall Operations,” having Ser. No. 09/280,374;
“A System, Method, And Program for Modifying a Library Object,” having Ser. No. 09/280,347;
“A System, Method, And Program For Installation on Drives Using a Drive Object,” having U.S. patent application Ser. No. 09/280,353; and
“A System, Method, and Program for Performing Program Specific Uninstall Operations,” having U.S. patent application Ser. No. 09/280,373.
A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
1. Field of the Invention
The present invention relates to a system, method, program, and data structure for installing and uninstalling programs and in particular for checking dependencies of installed components.
2. Description of the Related Art
An installer program is a software program that enables a programmer to write specific code to install a given application program onto the drives of a computer in a way that enables the given application program to work correctly with the computer's environment, including its operating system. There are several types of installers—Java installers and operating system specific installers, e.g., Microsoft Windows installers, and International Business Machines (“IBM”) OS/2 and AIX operating system installers, etc. Many of the install programs existing today have various limitations in their functionality as discussed below.
One type of Java installer is provided by a software company known as InstallShield. Currently, the functionality and configurability of this Java installer is somewhat limited. For example, the Java installer provides default panels, but the text cannot be changed or configured. Also, this Java installer is not easy to customize. In other words, a programmer cannot easily add a function that is not provided by the installer program. In addition, the current Java installer provides only limited registry support. A registry is a central repository for all possible information for the computer such as hardware configurations and software settings, etc. The registry maintains information on installed components. A programmer or user can access the registry to determine information about installed products, based upon what the user/programmer placed into the registry or what information is useful to the user. Presently, the Java installer only works with a Microsoft Windows' registry; and the support provided with Microsoft Windows is limited. For example, the current Java installer does not enable the Windows' system registry to be updated directly. Instead, the keys to update in the registry are in a file which must be imported into the registry through a system call. It would be desirable if such a Java installer program supported multiple directories, splash screens (which are images that come up while a software product is being installed), and multiple languages instead of only English. Furthermore, it would be desirable for a given installer program to be more broadly applicable to other environments and operating systems. Although InstallShields' Java installer is tailored to Java, it is also geared somewhat for the Windows' operating system as discussed above in terms of the Windows' registry support provided. However, it does not provide specific support for other operating systems such as the IBM OS/2 and AIX operating systems.
Another Java installer is called “Install Anywhere” from ZeroG. This Java installer program also has a default panel that is not configurable, e.g., the order in which panels appear is not customizable. Likewise, registry support is limited. A user/programmer updates a registry from a file using a “reg_edit” command. Although this installer program enables a user/programmer to add a few items into the registry, the registry cannot be queried. In addition, other registry functional features are not available. Likewise, there is no multiple directory support, and no national language support. Also, it does not support multiple operating systems, i.e., there is no OS/2 or AIX specific support.
Another approach would be to provide install APIs for Java. However, this approach is not yet available.
With respect to operating system specific installers, InstallShield provides a Microsoft Windows' 32 installer, e.g., Microsoft Windows 95/98 and NT. Although this installer program is widely used throughout the industry, it is based upon a proprietary scripting language developed by InstallShield. The scripting language is similar to Basic programming language. Programmers, who generally have experience and knowledge of object oriented programs such as C++ and Java, must learn this proprietary InstallShield script, which is not related to the popular computer languages, in order to program an Install program. This unfamiliarity with the proprietary InstallShield scripting language complicates the installer programming process.
Moreover, each operating system provides different techniques to track installed programs and their dependencies. A dependency indicates a program that another program needs in order support all functions. A depending program is a program that requires the installation of a dependent program to implement all the depending programs features and functions. Thus, there is a need in the art for a system for checking dependencies that can be used across operating systems, including with those operating systems that currently do not check whether dependent components are installed when installing a program.
To overcome the limitations in the prior art described above, preferred embodiments disclose a system, method, program, and data structure for installing a program onto a computer including an operating system. Dependency objects indicate a dependent component on which the program to install depends. The program processes the dependency objects before installing the program and determines an operating system command that is capable of determining whether the dependent component indicated in the dependency object is installed in the computer. The program then executes the operating system command to determine whether the dependent components indicated in the dependency objects are installed in the computer. An indication is made as to the dependent components that are not installed after determining that dependent components are not installed.
In further embodiments, the dependency object is capable of including an install script to install the dependent component onto the computer. In such case, a determination is made as to whether the dependency object that includes dependent components that are not installed in the computer includes install script. The install script is enabled after it is determined that the dependency object includes install script. A user may select to execute the enabled install script to install the dependent component.
In still further embodiments, the program is installed after processing the dependency objects and determining that the dependent components are installed in the computer. After installing the program, an indication of the installed program is made in a data structure. The dependency objects are then processed to determine the dependent components from which the installed program depends. An indication is made in the data structure of those dependent components determined from the dependency objects for the installed program. This data structure may be used when removing an installed program to determine whether the installed program to remove is indicated as a dependent component. If so, the data structure is used to locate depending programs that depend upon the dependent components to operate in at least one respect. The installed program cannot be removed until the determined depending programs are removed.
Preferred embodiments provide a data structure and program for determining whether all dependent components are installed before installing a depending program which needs the dependent components installed to perform all functions. Preferred embodiments further provide mechanisms for installing the dependent components not installed in order to allow the installation of the depending program that requires that the dependent components be installed. These mechanisms used to maintain information and determine dependencies may further be used during removal of a program to insure that programs are not removed that are dependent components from which other installed programs depend.
With preferred embodiments, the dependency object may be used across operating systems to check dependencies for all operating systems on which the install program operates. In this way, the dependency object is part of the cross-platform capabilities that allow the installer program to install products on different operating system platforms.
Referring now to the drawings in which like reference numbers represent corresponding parts throughout:
FIG. 1 is a block diagram illustrating a software and hardware environment in which preferred embodiments of the present invention are implemented;
FIG. 2 is a block diagram illustrating structural components of the installer program in accordance with preferred embodiments of the present invention;
FIG. 3 illustrates the fields in a dependency object in accordance with preferred embodiments of the present invention;
FIGS. 4a, b illustrate logic implemented in the install program to check dependencies using the dependency object in accordance with preferred embodiments of the present invention;
FIG. 5 illustrates a diagram of a data structure indicating installed components and their dependencies in accordance with preferred embodiments of the present invention; and
FIG. 6 illustrates logic implemented in the install program to uninstall a program.
In the following description, reference is made to the accompanying drawings which form a part hereof and which illustrate several embodiments of the present invention. It is understood that other embodiments may be utilized and structural and operational changes may be made without departing from the scope of the present invention.
With reference to FIG. 1, a block diagram of a data processing system 10, i.e., computer system, in which a preferred embodiment of the present invention may be implemented is depicted. The computer includes a processor 11 and memory 12. The computer 10 may be, but is not limited to, a personal computer, workstation, or a mainframe. The computer system also includes input means 13 such as a keyboard and/or mouse and/or track ball and/or light pen and/or pen-stylus and/or voice-sensitive device and/or touch-sensitive device, and/or other pointing devices and/or other input means. Also included are display means 14 such as a display monitor and other output means 15 such as printers, etc. Memory 12 includes volatile or nonvolatile storage and/or any combination thereof. Volatile memory may be any suitable volatile memory device known in the art, e.g., RAM, DRAM, SRAM, etc. Nonvolatile memory may include storage space, e.g., via the use of hard disk drives, for programs, whether or not the programs are being executed.
The programs in memory 12 includes an operating system (OS) 16 program and application programs, such as an install program 17 or an installer tool kit. If the memory 12 is comprised of volatile and nonvolatile memory devices, then data and programs may be swapped between the volatile and nonvolatile devices in a manner known in the art.
The exemplary embodiment shown in FIG. 1 is provided solely for the purposes of explaining the invention and those skilled in the art will recognize that numerous variations are possible, both in form and function. For instance, any one or more of the following—the processor and/or memory and/or the input/output devices—could be resident on separate systems such as in a network environment. Any such variation to FIG. 1 is within the sprit and scope of the present invention. The computer system and parts thereof depicted in the figures and described below, and the Java implementations described herein, are provided solely as examples for the purposes of explanation are not intended to necessarily imply architectural limitations. Those skilled in the art will recognize the numerous programming languages which may be utilized, all of which are believed to be embraced within the spirit and scope of the invention.
The system, method and program of a preferred embodiment of this invention enables the creation of a cross-platform installer program in accordance with the structural components and flow of FIG. 2.
A script, referred to herein as “installerjava”, 101FIG. 2, is used to run the install engine. The script implements the base installer class in Java. Within the script 101 there are the following entities: a) install properties 111; b) an override function 112; c) and a state machine 113. Within the state machine 113, there are various states 130 such as a welcome state, a destination state, a copy state, etc. This state machine includes an “add state method” 131 which is further used to check for errors. The following process takes place when the base installer class starts running: a) the properties are set up, 111, b) the properties are overridden, 112, and then c) the state machine 113 is executed. The program stays in the state machine until exited out. At exit, the program has either been successfully or unsuccessfully installed.
Within any given state 130 there are several objects. There are helper classes 301, GUI panels 302, and a program object 303.
Within the helper classes 301, there is a modify file class 311, a drive object class 312, a J file class 313, a J install class 314, a run exec class 315, and a text class 316. The modify file class 311 and drive object 312 will be discussed in more detail either below or in a related application. J file 313 is a class that enables actions to be performed with files and directories. J install 314 contains methods that enable access to environment variables and other similar activities. Run exec 315 is a class that enables the running of operating system calls. Text class 316 is a class that is used to handle national language support.
An example of a GUI panel 320 is shown in FIG. 2. There may be an image 321, text or controls 322 and buttons 323 such as back, next or cancel. The GUI panels 320 all extend a class calling a wizard dialog. They are displayed in a mainframe class 329. The mainframe class manages the screen display, e.g., gradient background color, gradient text. It also manages the splash screens and titles and other similar items including where they are being displayed. In other words, it manages the background image and screen image upon which the dialogs are displayed.
The install program further includes a program object 303 comprised of file set objects 340. Within each file set object 340 there are multiple install objects 330. There are several types of install objects—file object 331, registry object 332, shortcut object 333, directory object 334, permissions object 335, a library file object 336, a dependency object 337, and folder object 338. Other objects are also possible. All of these objects extend or implement install objects 330. In addition, all of the install objects have certain methods on each of them. In particular, each install object knows how to install or uninstall itself, how to log itself, and how to internalize from a log, i.e., how to build itself back up again from reading from a log.
The install process that the script 101 enables includes running the state machine 113 through various states 130 which cause different events to take place. For example, a GUI panel may pop up as part of the welcome state. During a destination state, another GUI panel may pop up on the screen that queries a user for the location of where to install the program. The install properties 111 may be used in the destination state by having a destination panel set a particular destination directory name of an install property to a particular directory. During the copy state, the program object 303 is built-up including all of the install objects 330. The install command 304 is then called on the program object. Each one of the file sets 340 and install objects 330 contains an install method. As such, by calling install 304 on the parent object, i.e., the program object 303, the program object goes through and calls install on all of the included file sets and install objects 340, 330.
Likewise, the uninstall process is also enabled by the script 160. For uninstall, there is an uninstall method on the file set 340 and on all of the other install objects 330. By calling uninstall 305 on the program 303, everything becomes uninstalled, i.e., the program, file sets and install objects.
It should be noted that during an install, each one of the install objects 330 is written out to a log file 140 which is put into a particular directory. At the same time that the install objects 330 log themselves to the log file, there is also another file, called “uninstall.Java1” 150 which implements a “base uninstall” class, which includes several methods that get called at different points during uninstall. During install, the log 140 and “uninstall.Java1” 150 information are built. The log file 140 and “uninstall.Java1” 150 are in the file system 170 on a particular directory. If it is uninstalled, the first thing that happens is that it reads into “uninstall.Java2” 160 the log files 140 and recreates the same structure 160 as the file sets 340 and install objects 330. It does not recreate the program object 303, but rather it recreates the structure of everything contained within the program object, i.e., file sets 640 and install objects 630. As a result, recreated from the log file 140 is a file set with all of the install objects that it contains. There is one log file for each file set. Directory 170 can be thought of as a container just like the program directory 303 is a container for the file set 340 and install objects 330.
“Uninstalljava2” 160 builds up the file sets 640. Uninstall 605 is called by the uninstaller, and it goes through each file set and install object and uninstalls itself. During the uninstall of each file set 640, the base uninstaller class 150 is called at the beginning and at the end of the file set. Therefore, at the beginning and ending of copying a file set 640, the installer makes a call to the base uninstaller class 150 at appropriate points 601, 602, 603.
There are certain platform specific operations that are taking place throughout the different objects, i.e., the helper classes 301, install objects 330, etc. Therefore, there is a platform specific module/interface. It is referred to herein as CPP 201. It defines a set of methods, that are representative of different operating systems, for functions that need to take place for an install. There are several different CPPs 211, 212, 213, . . . 219, etc., one for each operating system. For example, CPP Win 32, CPP OS/2, CPP Solaris, CPP Linux, and CPP AIX. There is also a CPP default. If the operating system is not implemented through a CPP, the CPP default is used. This CPP 201 is the platform specific code for the installer.
Since most platforms, i.e., operating systems, do not have a registry, a platform independent registry database class 220 is created which ties the platform specific code 201 with registry objects 332. The registry database 220 implements the registry function for those platforms which do not have a registry.
The installer tool kit of the preferred embodiment of this invention supports the Windows 32 operating systems including Windows 95, Windows 98and NT 4.0. It also supports OS/2 Warp 4.0, OS390, AIX 4.1 and higher versions, Solaris and Linux 4.2. Although the structure of the preferred embodiment enables support for any given operating system or environment, future embodiments or further enhancements to the present preferred embodiment will enable full support for other operating systems such as NT 5.0, HP-UX, AS/400, or any other operating system. The installer program 17 or tool kit may be written in a script based object oriented programming language, such as Java. The developer may utilize the programming language commands to develop an install program according to the developer's specifications. In preferred embodiments, the developer may determine the program flow and the display of specific graphical user interface (GUI) panels. Furthermore, the tool kit enables a developer to perform functions on files and directories, e.g., to copy, read, create, modify, version and to batch files. With respect to registry functions, the tool kit enables a developer to write an install program that can read, create, modify, delete, and enumerate registries for the Windows operating system which is the only operating system that has a registry object. These same functions are provided for all other operating systems that do not have a registry, but do have registry equivalent functionality.
Other functions of the tool kit include i) providing install property objects that contain variables as values that become defined for a specific operating environment; ii) enabling a property value to be temporarily overridden; iii) a software state machine that enables a programmer to easily customize an install program by merely adding, deleting, or changing the various states that contain the functions and flow of control of the program; iv) automatically detecting a programming error if a programmer incorrectly specifies a non-existent state within the state machine; v) automatically selecting a system-dependent function; vi) a containment structure consisting of program object, fileset objects, install objects, where each fileset object and install object contains means to install and uninstall itself and to log itself; vii) enabling the management of folders, shortcuts and icons; viii) enabling environment variables to be read, created, modified and deleted; ix) providing dependency checking of prerequisite programs during both install and uninstall; and x) providing various logs, e.g. a log for keeping track of what is being installed, and a log that reports the progress of install. Logs are used for both the install and uninstall process. Furthermore, these logs are human readable which allows them to be checked, e.g., after a silent install, to ensure that a file has installed successfully. The tool kit also enables multiple destination directories to be installed from multiple source directories. For example, there can be multiple components of file sets included in an install where a file set is a separately installable/uninstallable piece of code or set of files.
The tool kit also enables an install program to undo an install, i.e., uninstall. In preferred embodiments, the steps of the install operation are maintained. In this way, if a second installation is performed over an initial installation, the changes made by the second installation are saved in a file. In this way, if the second installation is removed, the system may be restored to the state at the first installation using the information saved on the installation. In other words, a previous version is recovered when a latest version is uninstalled by replacing a backup of files.
Other features include a) a progress bar that shows the status during an install, b) splash screens which can be displayed during an install, c) national language support, d) the ability to perform unattended install from install scripts, and e) an install wizard. There are also twenty or so defining default panels that are available. It is also easy for a programmer to add a programmer's own panels without a lot of effort.
Preferred embodiments of the invention include a) an installer tool kit, including a system, method, and program, that enables the creation of install programs for any one of a plurality of operating systems as described herein, b) an install program that can be used for multiple platforms to install an application program on a specific operating system; i.e., the same install program can be used to install a similar application program on different operating systems, c) a method for carrying out the functions of the install program, and d) a computer system running the install program on a specific operating system for installing an application program. Other more general embodiments include a) any tool kit for enabling the creation of programs that are capable of running on more than one operating system, b) any program that is enabled for multiple platforms, c) methods carried out by cross platform programs, and d) a computer system running a program that is enabled for multiple platforms.
The above description presented an overview of the install program and how it works. The following describes, in more detail, various parts of the overall structure and process described above.
FIG. 3 illustrates the fields within a dependency object data structure 400 in accordance with preferred embodiments. The dependency object data structure 400 includes the following fields: filename 402; file set name 404; file set version 406; program name 408; program version 410; state variables 412; type 414; install 416; SInstall 418; OS (for Operating System) 420; URL (for Universal Resource Locator) 422; Comp_Value 424; Install Info 426; Passed 428; Failed 430; NOT_CHECKED 432; desc 434; registry route 436; and install object 438.
The dependency object 400 is used during install and uninstall operations to determine whether any files or programs upon which the program to install needs in order to operate are installed and determine whether any programs to uninstall are required by already installed programs. As used herein, the term “depending program or file” refers to a program or file that depends on the installation of another program to operate in full, and the term “dependent program or file” refers to a program or file which must be installed in order for the depending program to perform all intended functions.
The developer generates the dependency object 400 when creating the file set 34 using construction methods that are methods of the dependency object class. Multiple dependency objects 400 may be added to a file set 34 for each file, program or registry entry within the registry file that is needed for the installed program to operate. A separate construction class is used for each type of dependency object 400, i.e., a file, program, or registry object. Dependency objects 400 are inserted into file sets 340 to determine whether the files, programs and/or registry entries that the installed file set needs to operate are already installed on the system. In preferred embodiments, there are separate constructors for each type of dependency that may be checked, e.g., file set, program, registry entry, to create a dependency object for the dependency to be checked.
The filename field 402 indicates the name of a dependent file and is used when the dependency object 400 is checked to determine whether a file is installed. If this field is empty, then the dependency object does not check for a file. The file set name 404 and file set version 406 fields indicate a file set name and version included within the program identified by the program name 408 and version 406 fields. The file set includes separate components of the program object. The install field 416 includes script of an install program to execute in case the file, program or registry entry indicated in the dependency object 400 is not installed. The SInstall field 418 indicates a silent install program which installs the determined file set or program not installed. The SInstall field 418 may further pass a response file to the install program 17 including information used to control the installation. In this way, the user need not enter any information during a silent installation as such information is provided through the Response file. The options provided with the Response file may include parameters which the user previously answered during the installation process. The response file options are built with knowledge of the sequence of events during the installation of the file or program in the dependency object.
The OS 420 field indicates the operating system in which the dependency object 400 will be executed to check for dependencies, i.e., the system OS 16. The URL 422 field indicates a URL of where to download the dependent file or program when running the install script. The Type field 414 indicates the type of dependency being checked, i.e., file, program, file set or registry object. The state variables 412 indicate whether the dependency object 400 applies to a particular operating system. The Comp_Value 424 field is used in the event the Type 414 is a registry object. When the Type field 414 indicates a registry object, a determination is made as to whether a an entry in the registry file, referred to as a registry entry, matches a value in the Comp_Value 424 field. The Comp_Value 424 can be used to check equal, greater, less than, etc. The install info 426 field includes information on where to obtain a file to install if install script is not provided in the Install 416 or SInstall 418 fields.
The dependency object 400 also includes state variables Passed 428, Failed 430, and NOT_CHECKED 432 fields, which are set to indicate the state of the dependency object 400, i.e., whether dependency object 400 has passed, failed or not been checked. When the dependency object is first processed, the NOT_CHECKED field 432 is set to “off.” If the dependent component of the dependency object 400 is installed in the system, then the Passed field 428 is set “on;” otherwise, the Failed field 430 is set “on.” In this way the dependency object 400 would maintain information on previous processing efforts. Only after the Passed field 428 is set “on” in all the dependency objects in the file set 340 being installed may the file set be installed. If any dependency objects 400 in a file set have the failed field 430 set “on,” then the file set may not be installed because the dependent component is not installed.
The description (“desc”) field 434 provides a written description of the dependency. The description in the field 434 is displayed to the user if the dependency is not satisfied. The description information may list the name of the dependent component(s) not installed. A registry route field 436 is the location or dependency directory in the registry file or object where the dependency information is saved. An install object 438 variable indicates the registry entry in the registry file that is the dependent component. Just as the filename field 402 maintains the name of a file which is a dependent component, the install object 438 maintains the registry entry dependent component, when the subject of the dependency object 400 is a registry entry.
In alternative embodiments, dependency objects may be implemented with more or less of the fields described above without departing from the scope of the invention. Moreover, the dependency object 400 may be implemented using programming and data structure techniques known in the art.
In preferred embodiments, as part of the installation process, a check_dependency program is executed before the objects in a particular file set are installed. The check_dependency program checks every dependency object in the file set to install. The check_dependency program is part of the CPP modules 201 as it includes native operating system commands to check whether the file, program or registry object indicated in the dependency object 400 is installed on the system. In this way, the check_dependency program utilizes commands within the OS 16 on which the installation is being made. Because the dependency object 400 can be utilized by CPP modules 201 for different operating systems, the dependency object 400 may be used across operating system platforms. The installation program developer need only write a single dependency object 400 which may then be used by the different CPP modules 201 when installing the program on the particular operating system corresponding to the CPP module 201 being called.
FIGS. 4a, b illustrate logic implemented in the install program 17, in an object oriented computer language, e.g., Java, C++, etc. The logic of FIGS. 4a, b is implemented by a call to the check_dependency function, which is a function in the class Dependency Object that includes data and methods of the class Dependency Object. There may be a check_dependency function in each CPP module 201 specific to an operating system to handle the dependency checking for that specific operating system. This function determines whether the file, program or registry object indicated in the dependency object 400 is installed on the computer. Control begins at block 500 where the install program 17 processes a call to the check_dependency function within the CPP module 201 for the operating system on which the program is being installed. This function is executed before a file set 340 is installed. Control transfers to block 502 where the check_dependency function processes the File Set 304 at which the call was made to the check_dependency function. Control transfers to block 504 which is the start of the loop that iterates for each dependency object located in the processed File Set 304. The loop starts at block 506 where the check_dependency function processes the Type field 414 to determine the type of dependent component being checked, e.g., file, program, registry object. The check_dependency function then processes (at block 508) the OS field 420 to determine the operating system in which the dependency is being checked, i.e., the operating system on which the install program 17 is executing. If, at block 509, the operating system (O/S) specified in the O/S field 420 does not match the operating system on which the install program 17 is executing, then the check_dependency function sets the state to skip, and proceeds to block 530. Otherwise, control transfers to block 510 to process the CPP object in the CPP 201 for the operating system indicated in the OS field 420 to determine the operating system command to use to check whether the dependent component is installed. For instance, the Windows operating system has an uninstall key which is used to search the registry file to determine whether a program is installed on the computer. Other operating systems include a data base similar to the registry program that indicates the installed components. Alternatively, the check_dependency function may utilize a registry database 220 to maintain information typically maintained in a registry file.
Control transfers to block 512 where the check_dependency function determines whether the Type field 414 indicates the type as a program. The check_dependency function may call a method in the Dependency Object class to obtain the type information, e.g., getType( ). If so, control transfers to block 514 to execute the native operating system command determined at block 510 to determine whether the program and version indicated in the Program Name 408 and Program Version 410 fields is installed in the system 10. The registry object may be searched to determine whether a program is installed. As discussed, information on installed components is added to a registry file, e.g., registry 220, when the components are installed. If the Type 414 is not a program, then control transfers to block 516 where the check_dependency function determines whether the Type 414 field indicates that the type is a file. If so, control transfers to block 518 where the check_dependency function executes the native operating system command determined at block 510 to determine whether a file having the name indicated in the Filename field 402 is installed in the system. Otherwise, if the type is not a file, the type indicated in the Type field 414 must be a registry entry in a registry object. If the type is a registry entry, then control transfers to block 520 where the check_dependency function executes the command determined at block 410 to determine whether the registry entry in the file matches the registry object value indicated in the Comp_Value 424 field.
After executing the command at block 514, 518 or 520, a determination is made as to whether the dependent component is installed in the system 10. If so, control transfers to block 524 to set the Passed field 428 to “on” and NOT_CHECKED 432 to “off.” Otherwise, control transfers to block 526 where the program logic sets the Failed field 428 to “on” and NOT_CHECKED 432 to “off,” and returns the dependency object 400. Control transfers to block 528 to perform another iteration of the loop until all dependency objects 400 in the File Set 340 are processed. After all dependency objects are processed, control transfers to block 530 in FIG. 4b if dependency objects were returned. The logic of FIG. 4b may be implemented within the install program 17 after receiving returned dependency objects from the check_dependency function. Block 530 represents the beginning of a loop to generate a list from the information maintained in the description (“desc”) field 434 of all returned dependency objects to display to the user, indicating dependent components that must be installed before the depending program may be installed. For each returned dependency object, control transfers to block 532 where the install program 17 determines whether an install script is provided in the Install 416 or SInstall 418 fields. If so, control transfers to block 534 where the program displays on the display means 14 the name of the dependent component that was not located on the system and a radio button to allow the user to selectively cause the execution of the install scrip in the Install 416 or SInstall 418 fields. If there is not install script, then control transfers to block 536 where the program displays information maintained in the install information field 426 to inform the user on where to obtain the dependent component that is needed before the program may be installed. From block 534 or 536 control transfers to block 538 to perform another iteration of the loop until all returned dependency objects are processed. If there were no returned dependency objects, then the program may be installed without performing the loop at blocks 530 through 538.
When the user selects to install the file, the install program 17 will execute the install script in either the Install 416 or SInstall field 418. If the install script requires retrieval of a file from a URL location, then the install program 17 may obtain the URL location from the URL field 422 using another method function, e.g., getURL( ), and install the file obtained from the URL location. During execution of install script from the Install field 416, the install program 17 may prompt the user for installation options. During execution of install script from the SInstall field 418, the program may pass a Response file to the installation program to set options from the response file instead of requesting user input.
During installation of a program and file sets, information is written to the registry file on the programs installed. During installation of a dependent program, dependency information from the Dependency Object 400 may be written to a dependency location indicating dependent components of the installed file. In this way, before uninstalling a program, a determination may be made as to whether other installed components depend on the file being uninstalled.
FIG. 5 illustrates a data structure, which in preferred embodiments is maintained in the registry object or registry database 220, indicating installed programs and dependent components on which installed programs depend. In the embodiment of FIG. 5, the data structure is a hierarchical arrangement of programs, file sets, and dependent components in the form of a directory tree. A root directory includes a sub-directory for each installed program, indicating the program name and version. Each installed program includes a next level subdirectory for each file set of the installed program, indicating the file set name and version. Each installed file set component has a Dependency subdirectory which includes information on each dependent component on which the file set and program depend in order to operate. The dependency subdirectory would list the program name, version, fileset name, and fileset version for each program on which the fileset including the dependency subdirectory depends. The registry route 436 in the dependency object 400 indicates the location of the dependency directory in the registry file where the dependency information for a particular dependency object is maintained.
The information in this directory is created whenever a component is installed. For instance, whenever a program is installed, a subdirectory is created under the root directory. The registry route 436 is used to determine the dependency directory of where to write dependency information when the program is installed. In further embodiments, the dependency directory may indicate dependent file sets or registry objects that are the subject matter of the processed dependency object. If there are no dependent components, then the dependency directory will contain no values. Whenever a program is installed as a result of the execution of the install script in the Install 416 and SInstall 418 fields, a subdirectory would be created in the root directory for the installed dependent component. During installation, after the program is installed and all dependency objects are processed and the Passed field 428 is “on,” the program may indicate values in the Dependency directory by processing all the passed dependency objects in the installed file set and writing the program name and version indicated in the dependency object fields 408 and 410 to the dependency directory.
FIG. 6 illustrates logic implemented in a program that is executed during the uninstallation of a program from the system. At block 560, the program processes a request to uninstall a program. Control transfers to block 562 where the program processes all the dependency directories. At block 564, the program determines whether the program to uninstall is listed as a value in any of the dependency directories. If so, control transfers to block 566; otherwise, control transfers to block 568 to proceed with the uninstallation. At block 566, the program determines the depending program in each instance of the program to uninstall listed in a dependency directory. The uninstall program may navigate the directory structure from the dependency directory shown in FIG. 5 to determine dependant programs that depend on the program subject to the uninstallation. Control then transfers to block 570 to exit uninstallation and display to the user on the display means 14 information indicating the depending programs that should be uninstalled before continuing with the uninstallation of the program, which is a dependent program. In this way, a dependent program will not be removed to render depending programs still installed inoperable in any manner.
This concludes the description of the preferred embodiments of the invention. The following describes some alternative embodiments for accomplishing the present invention.
The preferred embodiments may be implemented as a method, apparatus or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof. The term “article of manufacture” (or alternatively, “computer program product”) as used herein is intended to encompass one or more computer programs and data files accessible from one or more computer-readable devices, carriers, or media, such as a magnetic storage media, “floppy disk,” CD-ROM, a file server providing access to the programs via a network transmission line, holographic unit, etc. Of course, those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope of the present invention.
The program flow logic described in the flowcharts above indicated certain events occurring in a certain order. Those skilled in the art will recognize that the ordering of certain programming steps or program flow may be modified without affecting the overall operation performed by the preferred embodiment logic, and such modifications are in accordance with the preferred embodiments.
Preferred embodiments of the install program 17 and install kit were described as implemented in the Java programming language. However, any other object oriented programming language or other programming language may be used to implement the install program 17 and provide the user with tools to develop an install script.
In preferred embodiments, the dependency object was used to determine the installation of three types of structures, files, programs or registry objects. In further embodiments, the dependency object may be used to check for the installation of other types of objects and install such other objects.
Preferred embodiments were described with respect to a registry object and hierarchical data structure, such as shown in FIG. 5, to maintain information on installed components and dependencies. However, those skilled in the art will appreciate that the present invention may apply to alternative types of indexes and database structures that are used to maintain information on installed components.
In summary, preferred embodiments disclose a system, method, program and data structure for installing a program onto a computer including an operating system. Dependency objects indicate a dependent component on which the program to install depends. The program processes the dependency objects before installing the program and determines an operating system command that is capable of determining whether the dependent component indicated in the dependency object is installed in the computer. The program then executes the operating system command to determine whether the dependent components indicated in the dependency objects are installed in the computer. An indication is made as to the dependent components that are not installed after determining that dependent components are not installed.
The foregoing description of the preferred embodiments of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto. The above specification, examples and data provide a complete description of the manufacture and use of the composition of the invention. Since many embodiments of the invention can be made without departing from the spirit and scope of the invention, the invention resides in the claims hereinafter appended.
|Patente citada||Fecha de presentación||Fecha de publicación||Solicitante||Título|
|US5325533 *||28 Jun 1993||28 Jun 1994||Taligent, Inc.||Engineering system for modeling computer programs|
|US5499357 *||19 Ago 1994||12 Mar 1996||Xerox Corporation||Process for configuration management|
|US5721824 *||19 Abr 1996||24 Feb 1998||Sun Microsystems, Inc.||Multiple-package installation with package dependencies|
|US5787019 *||10 May 1996||28 Jul 1998||Apple Computer, Inc.||System and method for handling dynamic changes in device states|
|US5933646 *||10 May 1996||3 Ago 1999||Apple Computer, Inc.||Software manager for administration of a computer operating system|
|US5966540 *||23 Jul 1997||12 Oct 1999||International Business Machines Corp.||Hosted machine code installation|
|US6006035 *||31 Dic 1997||21 Dic 1999||Network Associates||Method and system for custom computer software installation|
|US6144960 *||1 Oct 1996||7 Nov 2000||Fujitsu Limited||Software registering/managing system and method thereof|
|1||Indigo Rose Software Design Corp. "Setup Factory 4.0" User's Guide, 1998.|
|Patente citante||Fecha de presentación||Fecha de publicación||Solicitante||Título|
|US6681391 *||21 Jun 2000||20 Ene 2004||Microsoft Corporation||Method and system for installing software on a computer system|
|US6715144 *||29 Dic 2000||30 Mar 2004||International Business Machines Corporation||Request based automation of software installation, customization and activation|
|US6725452 *||1 Jun 2000||20 Abr 2004||Aduoa, Inc.||Method for resolving dependency conflicts among multiple operative entities within a computing environment|
|US6738806 *||14 Jun 1999||18 May 2004||Wind River International, Ltd.||Method and system of deploying an application between computers|
|US6748570||28 Oct 1999||8 Jun 2004||International Business Machines Corporation||Sending a view event, and a request event having a class name and a method name|
|US6779155||29 Oct 1999||17 Ago 2004||International Business Machines Corporation||Method and apparatus in a data processing system for the controlling and sequencing of graphical user interface components and mediating access to system services for those components|
|US6779177 *||28 Oct 1999||17 Ago 2004||International Business Machines Corporation||Mechanism for cross channel multi-server multi-protocol multi-data model thin clients|
|US6782508||28 Oct 1999||24 Ago 2004||International Business Machines Corporation||Relaying input from a GUI view controllers to application mediators which created the view controllers|
|US6795965 *||26 Sep 2000||21 Sep 2004||Microsoft Corporation||Multi-source program module updater|
|US6813778 *||17 Jul 2000||2 Nov 2004||General Instruments Corporation||Method and system for downloading and managing the enablement of a list of code objects|
|US6829771||27 Abr 2000||7 Dic 2004||International Business Machines Corporation||Method and apparatus for selectable event dispatching|
|US6862686||29 Oct 1999||1 Mar 2005||International Business Machines Corporation||Method and apparatus in a data processing system for the separation of role-based permissions specification from its corresponding implementation of its semantic behavior|
|US6862711||28 Oct 1999||1 Mar 2005||International Business Machines Corporation||Method and apparatus in a data processing system for providing an interface for non-intrusive observable debugging, tracing, and logging data from execution of an application|
|US6880126||3 Ago 1999||12 Abr 2005||International Business Machines Corporation||Controlling presentation of a GUI, using view controllers created by an application mediator, by identifying a destination to access a target to retrieve data|
|US6886170||29 Oct 1999||26 Abr 2005||International Business Machines Corporation||Method and apparatus in a data processing system for the issuance and delivery of lightweight requests to concurrent and multiple service providers|
|US6918112 *||29 Nov 2000||12 Jul 2005||Microsoft Corporation||System and method to facilitate installation of components across one or more computers|
|US6948059 *||28 Sep 2000||20 Sep 2005||Rockwell Automation Technologies, Inc.||Component loader for industrial control device providing resource search capabilities|
|US6976244||9 Ene 2002||13 Dic 2005||International Business Machines Corporation||Method, system, and product for storage of attribute data in an object oriented environment|
|US6981250 *||5 Jul 2001||27 Dic 2005||Microsoft Corporation||System and methods for providing versioning of software components in a computer programming language|
|US6996815 *||29 Nov 2000||7 Feb 2006||Microsoft Corporation||Method and software tools for intelligent service pack installation|
|US6996816 *||2 Oct 2000||7 Feb 2006||Hewlett-Packard Development Company, L.P.||Utilization of third party legacy data list|
|US7058942||31 Mar 2005||6 Jun 2006||Microsoft Corporation||System and method to facilitate installation of components across one or more computers|
|US7080279||3 Dic 2003||18 Jul 2006||International Business Machines Corporation||Autonomic rollback|
|US7111280 *||23 Feb 2001||19 Sep 2006||Wind River Systems, Inc.||System and method for implementing a project facility|
|US7140013 *||7 Dic 2001||21 Nov 2006||Aduva, Inc.||Component upgrading with dependency conflict resolution, knowledge based and rules|
|US7155713 *||27 Abr 2000||26 Dic 2006||Microsoft Corporation||Componentized operating system|
|US7178143 *||9 Mar 2001||13 Feb 2007||Bea Systems, Inc.||Multi-version hosting of application services|
|US7181686||29 Oct 1999||20 Feb 2007||International Business Machines Corporation||Selecting screens in a GUI using events generated by a set of view controllers|
|US7185334 *||29 Nov 2000||27 Feb 2007||Microsoft Corporation||Method and software tool for intelligent operating system installation|
|US7210131 *||1 Oct 2001||24 Abr 2007||Microsoft Corporation||Method and system for migrating computer state|
|US7228541||17 Ene 2003||5 Jun 2007||National Instruments Corporation||Creation of application system installer|
|US7305671 *||23 Ene 2003||4 Dic 2007||Sun Microsystems, Inc.||Conversion of an object model to a source file generation model|
|US7343600 *||18 Ago 2003||11 Mar 2008||Lenovo (Singapore) Pte. Ltd.||Providing an image of installed software utilizing uninstall code|
|US7398524||30 Jun 2006||8 Jul 2008||Alan Joshua Shapiro||Apparatus and method for subtractive installation|
|US7418700 *||29 Ene 2001||26 Ago 2008||Microsoft Corporation||System and method to facilitate installation and/or removal of components|
|US7434202 *||24 Feb 2004||7 Oct 2008||Bea Systems, Inc.||System and method for software component dependency checking|
|US7451435||7 Dic 2004||11 Nov 2008||Microsoft Corporation||Self-describing artifacts and application abstractions|
|US7484223||2 Ago 2005||27 Ene 2009||Microsoft Corporation||System and method for building a run-time image from components of a software program|
|US7506332 *||24 Mar 2004||17 Mar 2009||Sap Ag||Object set optimization using dependency information|
|US7600232||7 Dic 2004||6 Oct 2009||Microsoft Corporation||Inter-process communications employing bi-directional message conduits|
|US7669200||2 Sep 2004||23 Feb 2010||International Business Machines Corporation||Resizing an install image|
|US7681205 *||14 Sep 2004||16 Mar 2010||Fuji Xerox Co., Ltd.||Connection monitoring and driver management method and apparatus and program therefor|
|US7694300||29 Abr 2005||6 Abr 2010||Microsoft Corporation||Inter-process interference elimination|
|US7712094||30 Jun 2006||4 May 2010||Alan Joshua Shapiro||Method and apparatus for replicating a panoplex onto a storage medium from a master|
|US7735078||30 Oct 2003||8 Jun 2010||Oracle America, Inc.||System and method for software patching for cross-platform products|
|US7739678 *||28 Feb 2006||15 Jun 2010||Sap Ag||Managing updates in an object oriented software system|
|US7788637||29 Abr 2005||31 Ago 2010||Microsoft Corporation||Operating system process identification|
|US7823148 *||15 Ago 2002||26 Oct 2010||Oracle America, Inc.||System and method for performing patch installation via a graphical user interface|
|US7873958||30 Sep 2005||18 Ene 2011||Microsoft Corporation||System and methods for providing versioning of software components in a computer programming language|
|US7882317||4 Ago 2006||1 Feb 2011||Microsoft Corporation||Process isolation using protection domains|
|US7926051 *||10 Nov 2003||12 Abr 2011||International Business Machines Corporation||Automatic parallel non-dependent component deployment|
|US7945906||25 Jul 2005||17 May 2011||Microsoft Corporation||Method and software tools for intelligent service pack installation|
|US8001523||5 Jul 2001||16 Ago 2011||Microsoft Corporation||System and methods for implementing an explicit interface member in a computer programming language|
|US8020141||6 Dic 2004||13 Sep 2011||Microsoft Corporation||Operating-system process construction|
|US8028049 *||1 Feb 2000||27 Sep 2011||Peer Intellectual Property Inc.||Apparatus and method for web-based tool management|
|US8032898||30 Jun 2006||4 Oct 2011||Microsoft Corporation||Kernel interface with categorized kernel objects|
|US8069438||8 Jun 2007||29 Nov 2011||Apple Inc.||Class declaration in a non-class-based programming environment|
|US8074231||30 Jun 2006||6 Dic 2011||Microsoft Corporation||Configuration of isolated extensions and device drivers|
|US8079025 *||8 Jun 2007||13 Dic 2011||Apple Inc.||Asynchronous load of source dependencies|
|US8099437||20 Dic 2010||17 Ene 2012||Alan Joshua Shapiro||Method and apparatus for selective file erasure using metadata modifications|
|US8122446||3 Nov 2005||21 Feb 2012||International Business Machines Corporation||Method and apparatus for provisioning software on a network of computers|
|US8132152||8 Jun 2007||6 Mar 2012||Apple Inc.||Extending a scripting language to provide an object hierarchy|
|US8151260||10 Mar 2008||3 Abr 2012||Lenovo (Singapore) Pte. Ltd.||Method for providing an image of software installed on a computer system|
|US8204969||5 Ago 2008||19 Jun 2012||Canon Kabushiki Kaisha||Method for retrieving updates via the internet|
|US8239855 *||27 Mar 2008||7 Ago 2012||Oracle International Corporation||Component-based software installation|
|US8245185||23 Jun 2008||14 Ago 2012||Alan Joshua Shapiro||System and method for software delivery|
|US8266615||29 Ene 2008||11 Sep 2012||Alan Joshua Shapiro||Method and apparatus for delivering percepta|
|US8286159||30 Jun 2006||9 Oct 2012||Alan Joshua Shapiro||Method and apparatus for gryphing a data storage medium|
|US8316444 *||16 Jul 2008||20 Nov 2012||Sap Ag||Third-party software product certification|
|US8321859||30 Jun 2006||27 Nov 2012||Alan Joshua Shapiro||Method and apparatus for dispensing on a data-storage medium customized content comprising selected assets|
|US8359571||19 Dic 2005||22 Ene 2013||International Business Machines Corporation||Computer method and apparatus for activity-based version selection in a configuration management system|
|US8429610 *||20 Dic 2005||23 Abr 2013||International Business Machines Corporation||Computer method and apparatus for providing version-aware impact analysis|
|US8468515||12 Dic 2006||18 Jun 2013||Hewlett-Packard Development Company, L.P.||Initialization and update of software and/or firmware in electronic devices|
|US8479189||11 Abr 2003||2 Jul 2013||Hewlett-Packard Development Company, L.P.||Pattern detection preprocessor in an electronic device update generation system|
|US8521781||14 Dic 2011||27 Ago 2013||Alan Joshua Shapiro||Apparatus and method for selective file erasure using metadata modifications|
|US8526940||6 Dic 2004||3 Sep 2013||Palm, Inc.||Centralized rules repository for smart phone customer care|
|US8549511 *||1 Abr 2010||1 Oct 2013||Sony Corporation||Information processing apparatus, executability determining method, and computer program for the same|
|US8555273||17 Sep 2004||8 Oct 2013||Palm. Inc.||Network for updating electronic devices|
|US8578361||27 Feb 2011||5 Nov 2013||Palm, Inc.||Updating an electronic device with update agent code|
|US8595720||9 Feb 2011||26 Nov 2013||Ricoh Company, Limited||Program management system, program management method, client, and computer program product|
|US8607223||28 Jul 2006||10 Dic 2013||International Business Machines Corporation||Creating multiplatform customized install packages for software installation|
|US8644959 *||21 Ago 2007||4 Feb 2014||Abb Ag||System and method for functionalization in line with demand, for control and regulatory devices|
|US8645939||28 May 2008||4 Feb 2014||Oracle International Corporation||Use of aliasing in an installer|
|US8661406||2 Ago 2012||25 Feb 2014||Alan Joshua Shapiro||Method and system for software delivery|
|US8707260 *||25 May 2007||22 Abr 2014||International Business Machines Corporation||Resolving interdependencies between heterogeneous artifacts in a software system|
|US8707297 *||26 Jul 2006||22 Abr 2014||Dell Products L.P.||Apparatus and methods for updating firmware|
|US8752044 *||27 Jul 2007||10 Jun 2014||Qualcomm Incorporated||User experience and dependency management in a mobile device|
|US8782089||22 Ago 2013||15 Jul 2014||Alan Joshua Shapiro||Selective file erasure using metadata modifications and apparatus|
|US8789037 *||5 Jul 2012||22 Jul 2014||Apple Inc.||Compatible trust in a computing device|
|US8789063||30 Mar 2007||22 Jul 2014||Microsoft Corporation||Master and subordinate operating system kernels for heterogeneous multiprocessor systems|
|US8798523||5 Jun 2012||5 Ago 2014||Sap Ag||Object set optimization using dependency information|
|US8813066 *||25 Mar 2009||19 Ago 2014||International Business Machines Corporation||Multi-component software application installation facility|
|US8849968||15 Dic 2005||30 Sep 2014||Microsoft Corporation||Secure and stable hosting of third-party extensions to web services|
|US8893110||26 Abr 2012||18 Nov 2014||Qualcomm Incorporated||Device management in a network|
|US8930944||18 Nov 2003||6 Ene 2015||Microsoft Corporation||Application model that integrates the web experience with the traditional client application experience|
|US8935658||21 Feb 2014||13 Ene 2015||Alan Joshua Shapiro||Digital asset delivery system and method|
|US9009694 *||15 Ago 2002||14 Abr 2015||Oracle America, Inc.||Pre-verification and sequencing of patches|
|US9038059||15 Mar 2013||19 May 2015||International Business Machines Corporation||Automatically targeting application modules to individual machines and application framework runtimes instances|
|US9075695||26 Feb 2013||7 Jul 2015||International Business Machines Corporation||Version conflict checking to installable unit|
|US9081638||25 Abr 2014||14 Jul 2015||Qualcomm Incorporated||User experience and dependency management in a mobile device|
|US9171005||14 Jul 2014||27 Oct 2015||Alan Joshua Shapiro||System and method for selective file erasure using metadata modifcations|
|US9176971||11 Sep 2012||3 Nov 2015||Alan Joshua Shapiro||Method and apparatus for subtractive installation|
|US9182966 *||31 Dic 2013||10 Nov 2015||International Business Machines Corporation||Enabling dynamic software installer requirement dependency checks|
|US9323519 *||31 Ago 2007||26 Abr 2016||Red Hat, Inc.||Packaging an application|
|US9344338 *||15 Sep 2012||17 May 2016||Facebook, Inc.||Facilitating file transfers using an icon|
|US9363147||15 Sep 2012||7 Jun 2016||Facebook, Inc.||Indicating status using a standalone icon|
|US9471297 *||10 Sep 2014||18 Oct 2016||Kcura Llc||Methods and apparatus for uninstalling a software application|
|US9477462||16 Ene 2009||25 Oct 2016||Oracle International Corporation||System and method for software product versioning packaging, distribution, and patching|
|US9563434||2 Feb 2010||7 Feb 2017||International Business Machines Corporation||Mining dependencies from disk images|
|US20010037494 *||23 Feb 2001||1 Nov 2001||Levien Richard B.||System and method for implementing a project facility|
|US20020066010 *||29 Nov 2000||30 May 2002||Bourke-Dunphy Erin M.||Method and software tools for intelligent service pack installation|
|US20020087734 *||29 Dic 2000||4 Jul 2002||Marshall Donald Brent||System and method for managing dependencies in a component-based system|
|US20020103973 *||29 Ene 2001||1 Ago 2002||Zimniewicz Jeff A.||System and method to facilitate installation and/or removal of components|
|US20020133805 *||9 Mar 2001||19 Sep 2002||Pugh William A.||Multi-version hosting of application services|
|US20020133814 *||29 Nov 2000||19 Sep 2002||Bourke-Dunphy Erin M.||System and method to facilitate installation of components across one or more computers|
|US20030074386 *||1 Oct 2001||17 Abr 2003||Microsoft Corporation||Method and system for migrating computer state|
|US20030121024 *||28 Mar 2002||26 Jun 2003||Microsoft Corporation||System and method for building a runtime image from components of a software program|
|US20030131341 *||9 Ene 2002||10 Jul 2003||International Business Machines Corporation||Method, system, and product for storage of attribute data in an object oriented environment|
|US20030218628 *||15 Ago 2002||27 Nov 2003||Sun Microsystems, Inc.||System and method for performing patch installation via a graphical user interface|
|US20030225774 *||23 Ene 2003||4 Dic 2003||Eran Davidov||Conversion of an object model to a source file generation model|
|US20040015946 *||7 Dic 2001||22 Ene 2004||Moddy Te'eni||Method for resolving dependency conflicts among multiple operative entities within a computing environment|
|US20040015955 *||29 Nov 2000||22 Ene 2004||Bourke-Dunphy Erin M.||Method and software tool for intelligent operating system installation|
|US20040143830 *||17 Ene 2003||22 Jul 2004||Gupton Kyle P.||Creation of application system installer|
|US20040168152 *||24 Feb 2004||26 Ago 2004||Bea Systems, Inc.||System and method for software component dependency checking|
|US20040205709 *||9 May 2001||14 Oct 2004||Sun Microsystems, Inc.||Method,system, and program for providing patch expressions used in determining whether to install a patch|
|US20040210941 *||12 May 2004||21 Oct 2004||Christopher Poli||Method and system for downloading and managing the enablement of a list of code objects|
|US20040221267 *||29 Abr 2003||4 Nov 2004||International Business Machines Corporation||Computer program product, data processing system, and method for installing or configuring computer software|
|US20040237082 *||23 Oct 2003||25 Nov 2004||Alcazar Mark A.||System, method, and API for progressively installing software application|
|US20050044096 *||18 Ago 2003||24 Feb 2005||International Business Machines Corporation||Method for providing an image of software installed on a computer system|
|US20050049790 *||3 Sep 2003||3 Mar 2005||Microsoft Corporation||System and method for validating whether a software application is properly installed|
|US20050102665 *||10 Nov 2003||12 May 2005||International Business Machines (Ibm) Corporation||Automatic parallel non-dependent component deployment|
|US20050102666 *||10 Nov 2003||12 May 2005||International Business Machines (Ibm) Corporation||Pre-deployment component hosting environment analyzer|
|US20050108678 *||18 Nov 2003||19 May 2005||Margaret Goodwin||Application model that integrates the web experience with the traditional client application experience|
|US20050138468 *||3 Dic 2003||23 Jun 2005||International Business Machines Corporation||Autonomic rollback|
|US20050210480 *||14 Sep 2004||22 Sep 2005||Fuji Xerox Co., Ltd.||Driver management method and apparatus and program therefor|
|US20050216923 *||24 Mar 2004||29 Sep 2005||Krebs Andreas S||Object set optimization using dependency information|
|US20050235281 *||19 Abr 2004||20 Oct 2005||Telefonaktiebolaget L M Ericsson (Publ)||Combined software installation package|
|US20050240554 *||19 Ago 2004||27 Oct 2005||Chris Evans||Data storage method and system|
|US20050265247 *||25 Jul 2005||1 Dic 2005||Microsoft Corporation||Method and software tools for intelligent service pack installation|
|US20050278579 *||2 Ago 2005||15 Dic 2005||Microsoft Corporation||System and method for building a run-time image from components of a software program|
|US20050289513 *||17 Jun 2004||29 Dic 2005||International Business Machines Corporation||Matrix pattern match techniques for uninstalling multiple dependent components|
|US20060020937 *||21 Jul 2005||26 Ene 2006||Softricity, Inc.||System and method for extraction and creation of application meta-information within a software application repository|
|US20060026568 *||30 Sep 2005||2 Feb 2006||Microsoft Corporation||System and methods for providing versioning of software components in a computer programming language|
|US20060041572 *||14 Jul 2005||23 Feb 2006||Fujitsu Limited||Software structure restoring method and apparatus, and computer-readable storage medium|
|US20060048138 *||2 Sep 2004||2 Mar 2006||International Business Machines Corporation||System, method, and program for resizing an install image|
|US20060123412 *||7 Dic 2004||8 Jun 2006||Microsoft Corporation||Self-describing artifacts and application abstractions|
|US20060123417 *||6 Dic 2004||8 Jun 2006||Microsoft Corporation||Operating-system process construction|
|US20060123418 *||29 Abr 2005||8 Jun 2006||Microsoft Corporation||Operating system process identification|
|US20060123430 *||29 Abr 2005||8 Jun 2006||Microsoft Corporation||Inter-process interference elimination|
|US20070006222 *||19 Jun 2006||4 Ene 2007||Henning Maier||Software installation method and computer system|
|US20070011199 *||15 Dic 2005||11 Ene 2007||Microsoft Corporation||Secure and Stable Hosting of Third-Party Extensions to Web Services|
|US20070094495 *||30 Jun 2006||26 Abr 2007||Microsoft Corporation||Statically Verifiable Inter-Process-Communicative Isolated Processes|
|US20070094673 *||30 Jun 2006||26 Abr 2007||Microsoft Corporation||Configuration of Isolated Extensions and Device Drivers|
|US20070143744 *||20 Dic 2005||21 Jun 2007||International Business Machines Corporation||Computer method and apparatus for providing version-aware impact analysis|
|US20070143752 *||19 Dic 2005||21 Jun 2007||International Business Machines Corporation||Computer method and apparatus for activity-based version selection in a configuration management system|
|US20070150886 *||30 Jun 2006||28 Jun 2007||Shapiro Alan J||Apparatus and method for subtractive installation|
|US20070150887 *||30 Jun 2006||28 Jun 2007||Shapiro Alan J||Apparatus and method for selectively dispensing soft assets|
|US20070150888 *||30 Jun 2006||28 Jun 2007||Shapiro Alan J||Method and apparatus for replicating a panoplex onto a storage medium from a master|
|US20070150889 *||30 Jun 2006||28 Jun 2007||Shapiro Alan J||Method and apparatus for panoplex generation and gryphing|
|US20070150890 *||30 Jun 2006||28 Jun 2007||Shapiro Alan J||Method and apparatus for gryphing a data storage medium|
|US20070150891 *||30 Jun 2006||28 Jun 2007||Shapiro Alan J||Method and apparatus for dispensing on a data-storage medium customized content comprising selected assets|
|US20070192387 *||30 Ene 2007||16 Ago 2007||Seiko Epson Corporation||Information processing device, method and program for controlling information processing device|
|US20070203953 *||28 Feb 2006||30 Ago 2007||Sap Ag||Managing updates in an object oriented software system|
|US20070240134 *||28 Feb 2006||11 Oct 2007||Joydeep Buragohain||Software packaging model supporting multiple entity types|
|US20080028385 *||26 Jul 2006||31 Ene 2008||Dell Products L.P.||Apparatus and Methods for Updating Firmware|
|US20080028390 *||28 Jul 2006||31 Ene 2008||International Business Machines Corporation||Creating multiplatform customized install packages for software installation|
|US20080028395 *||27 Jul 2007||31 Ene 2008||Giovanni Motta||User Experience And Dependency Management In A Mobile Device|
|US20080141242 *||29 Ene 2008||12 Jun 2008||Alan Joshua Shapiro||Method and apparatus for delivering percepta|
|US20080141266 *||4 Ago 2006||12 Jun 2008||Microsoft Corporation||Process Isolation Using Protection Domains|
|US20080155532 *||10 Mar 2008||26 Jun 2008||Lenovo (Singapore) Pte. Ltd||Method for providing an image of software installed on a computer system|
|US20080196024 *||8 Feb 2007||14 Ago 2008||Ibm Corporation||Method and Apparatus for Changing Software Components in an Information Handling System|
|US20080244507 *||30 Mar 2007||2 Oct 2008||Microsoft Corporation||Homogeneous Programming For Heterogeneous Multiprocessor Systems|
|US20080244599 *||30 Mar 2007||2 Oct 2008||Microsoft Corporation||Master And Subordinate Operating System Kernels For Heterogeneous Multiprocessor Systems|
|US20080295065 *||25 May 2007||27 Nov 2008||Hawkins Jennifer L||System and method for resolving interdependencies between heterogeneous artifacts in a software system|
|US20080307389 *||8 Jun 2007||11 Dic 2008||Apple Inc.||Extending a scripting language to provide an object hierarchy|
|US20080307390 *||8 Jun 2007||11 Dic 2008||Apple Inc.||Class declaration in a non-class-based programming environment|
|US20080307394 *||8 Jun 2007||11 Dic 2008||Apple Inc.||Asynchronous load of source dependencies|
|US20090064086 *||31 Ago 2007||5 Mar 2009||Norman Lee Faus||Systems and methods for packaging an application|
|US20090133014 *||16 Nov 2007||21 May 2009||Nokia Corporation||Methods, apparatuses and computer program product for automatic download of software dependencies on installation|
|US20090144726 *||28 May 2008||4 Jun 2009||Bea Systems, Inc.||Use of aliasing in an installer|
|US20090144727 *||28 May 2008||4 Jun 2009||Bea Systems, Inc.||Interpreted multiple product installation|
|US20090183150 *||16 Ene 2009||16 Jul 2009||Bea Systems, Inc.||System and method for software product versioning packaging, distribution, and patching|
|US20090249328 *||27 Mar 2008||1 Oct 2009||Oracle International Corporation||Component-based software installation|
|US20090282402 *||25 Mar 2009||12 Nov 2009||International Business Machines Corporation||Multi-component software application installation facility|
|US20100017849 *||16 Jul 2008||21 Ene 2010||Sap Ag||Third-party software product certification|
|US20100037216 *||5 Ago 2008||11 Feb 2010||Canon Kabushiki Kaisha||Method for retrieving updates via the internet|
|US20100100198 *||21 Ago 2007||22 Abr 2010||Wolfgang Hermann||System and method for functionalization in line with demand, for control and regulatory devices|
|US20100115506 *||10 Dic 2007||6 May 2010||Ljungbjoern Rune||Method and arrangement for software dependency resolution|
|US20100192126 *||1 Abr 2010||29 Jul 2010||Sony Corporation||Information processing apparatus, executability determining method, and computer program for the same|
|US20100192147 *||28 Ene 2010||29 Jul 2010||Brother Kogyo Kabushiki Kaisha||Method of installing software, program, and information processing apparatus|
|US20110067023 *||8 Sep 2010||17 Mar 2011||Chiyo Naoki||Software management apparatus, software distribution server, software distribution system, and software installation method|
|US20110107300 *||2 Nov 2009||5 May 2011||Seth Kelby Vidal||Systems and methods for utilizing a history of changes associated with software packages and configuration management to manage multiple computing systems|
|US20110191762 *||2 Feb 2010||4 Ago 2011||International Business Machines Corporation||Mining dependencies from disk images|
|US20110202915 *||9 Feb 2011||18 Ago 2011||Kuroyanagi Tomohiro||Program management system, program management method, client, and computer program product|
|US20120278597 *||5 Jul 2012||1 Nov 2012||Dallas Blake De Atley||Compatible trust in a computing device|
|US20130024469 *||21 Jul 2011||24 Ene 2013||International Business Machines Corporation||Apparatus and method for preventing regression defects when updating software components|
|US20130073633 *||15 Sep 2012||21 Mar 2013||Facebook, Inc.||Facilitating communications between computer users across a network|
|US20130198718 *||31 Ene 2012||1 Ago 2013||Red Hat Inc.||Automated configuration of an application in a computing platform|
|US20140250226 *||16 May 2014||4 Sep 2014||Accenture Global Services Limited||System for managing a remote data processing system|
|US20150186125 *||31 Dic 2013||2 Jul 2015||International Business Machines Corporation||Enabling dynamic software installer requirement dependency checks|
|CN103324507A *||25 Jun 2013||25 Sep 2013||宇龙计算机通信科技(深圳)有限公司||Method and apparatus for updating terminal preset application program|
|EP1818825A2 *||30 Ene 2007||15 Ago 2007||Seiko Epson Corporation||Information processing device, method and program for controlling information processing device|
|EP1818825A3 *||30 Ene 2007||12 Nov 2008||Seiko Epson Corporation||Information processing device, method and program for controlling information processing device|
|EP2369475A3 *||15 Feb 2011||9 Nov 2011||Ricoh Company, Limited||Program management system for checking dependencies when installing or uninstalling software|
|WO2005103952A1 *||17 Feb 2005||3 Nov 2005||Oracle International Corporation||Data storage method and system|
|WO2007006457A1 *||4 Jul 2006||18 Ene 2007||Giesecke & Devrient Gmbh||Management of applications in a mobile data carrier|
|WO2007072309A1||12 Dic 2006||28 Jun 2007||Shapiro Alan J||Apparatus and method for selectively dispensing soft assets via subtractive installation|
|Clasificación de EE.UU.||717/175, 707/999.107, 707/999.104|
|Clasificación cooperativa||Y10S707/99948, Y10S707/99945, G06F9/44521, G06F8/62, G06F8/61|
|Clasificación europea||G06F8/62, G06F8/61, G06F9/445L|
|29 Mar 1999||AS||Assignment|
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CURTIS, BRYCE ALLEN;REEL/FRAME:009860/0888
Effective date: 19990324
|18 Nov 2005||FPAY||Fee payment|
Year of fee payment: 4
|21 Ene 2010||FPAY||Fee payment|
Year of fee payment: 8
|4 Abr 2014||REMI||Maintenance fee reminder mailed|
|11 Jul 2014||SULP||Surcharge for late payment|
Year of fee payment: 11
|11 Jul 2014||FPAY||Fee payment|
Year of fee payment: 12